Sökning: "Computer-systems security"
Visar resultat 6 - 10 av 34 uppsatser innehållade orden Computer-systems security.
6. Capture-the-Flag challenges in higher education assignments : Influencing factors and requirements in development and user experience
M1-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Sammanfattning : Due to digitalization, computer systems have become integral to every aspect of oursociety. Not all the software and systems behind the wave of digitalization are securelydeveloped, tested, or properly configured and are, therefore, vulnerable to attacks. LÄS MER
7. Log Anomaly Detection of Structured Logs in a Distributed Cloud System
Uppsats för yrkesexamina på avancerad nivå, Lunds universitet/Institutionen för reglerteknikSammanfattning : As computer systems grow larger and more complex, the task of maintaining the system and finding potential security threats or other malfunctions become increasingly hard. Traditionally, this has had to be done by manually examining the logs. LÄS MER
8. Identifying and analysing forensic artefacts of specific attacks on a Programmable Logic Controller
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : In Industrial Computer Systems, Programmable Logic Controllers (PLCs) are essential components since they control physical processes. Altering these could have enormous consequences as they can control processes in nuclear plants, gas pipelines and water supplies. LÄS MER
9. Analysing Perceptions of Six Cyberattacks
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The main topic of this degree project is the analysis of the general public’s perceptions on six different types of cyberattacks and their security measures taken against these cyberattacks. One of the goals of this degree project was to investigate if the perceptions of the cyberattacks were accurate and if lower educated people have different perceptions from higher educated people. LÄS MER
10. Formal verification of device driver monitors in HOL 4
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : As computer systems become more ubiquitous in society the negative consequences of security holes and bugs in software and hardware grow larger. In theory, the optimal way to ensure that no such possibilites exists is to conduct formal proofs that the system behaves as it should and that it is incapable of performing unintended side-effects. LÄS MER